[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: WSJ on Big Java Flaw
[snip]
> > Mr. Felten said that unscrupulous people who discovered the
> > flaw could boobytrap a Web page on the Internet,
> > essentially seizing control of the browser software of any
> > PC that tapped into that page. At that point, the hackers
> > could read or delete an entire hard disk of data files.
> > "The consequences of this flaw are as bad as they can be,"
> > he said.[..]
>
> The generalized halting problem comes to mind...
>
> Since it can be proved that there's no complete set of heuristics
> to tell if a given program has a characteristic (such as "secureness")
> then sooner or later someone will discover another security flaw.
>
> A question is whether a simple patch is made or if the set of heuristics
> is widened (ie, learn from mistakes) so that similar flaws can be found
> based on knowledge of that one flaw.
Since this Java error is probably deep in the bytecode interpreter,
the question is will Sun patch this *particular* problem, still allowing
others, or will it have to rewrite the interpreter so that it enforces
the language more rigorously? They are under pressure to make a
"quick fix" (they've promised something in two days), but real
security needs to be built in to a system from the ground up,
with disciplline and thorough design. If they need to redesign their
approach to implementing the bytecode interpreter, that could take
weeks, months?
BTW, its a testament to security through code review, as the Princeton
team probably could not have discovered this deep flaw without looking
through the code.
David Macfarlane.